Imagine being able to legally work on producing the software to do this. Not just legally- but with the backing of the government.... no, I do not condone it...... but it would be fascinating to work on.:)

Imagine being able to legally work on producing the software to do this. Not just legally- but with the backing of the government.... no, I do not condone it...... but it would be fascinating to work on.:)

Imagine a world where a government employs such devious means...

Then imagine a world where the government kicks down your door because your detected their worm and quarantined it - which makes you a person of interest.

They use some more hands on methods to get it installed than your ordinary worm.Like breaking into your house, or snatching a device for a "security check" (at which point you are to give them all passwords of course).

"Then imagine a world where the government kicks down your door because your detected their worm and quarantined it - which makes you a person of interest."

Then imagine that country's track record over the first forty-five years of the last century, plus the track record (yet to be fully revealed) of the Eastern half of that country, and don't forget how many players are either still alive or lived long enough to have direct contact including training with current law enforcement.

NSA does not need to snoop in the leaf node, they have the network (and the cloud).
If I was NSA, I would also build a tight partnership with google, in fact, many of googles features looks like spinoffs of what I imagine NSA is doing.

You will have to apply for a job at that one company they hand all those shady contracts to. You know, the one the minister of interior is involved with.Good news though: from what the CCC told us, they are really in need of some capable hackers.

If they know it exists then it's not very secret is it? Most antivirus apps have open virus definition files. Chances are there is no whitelist for these, and in fact I would expect any AV tool that does heuristic scanning to pick it up.

They damn well better pick it up if they're going to pick up every cracked game executable in existence >_<

Anti Virus are good at picking up malware that spread a lot.But these trojans are supposed to be used in very limited cases, so there is little chance of any AV aiming to find them specifically (up until now that is).Heuristcs are supposed to handle such cases, but you can test your malware against those heuristics until you are good to go and if they don't know of you, they can't change heuristics to catch you.

Anti Virus are good at picking up malware that spread a lot.
But these trojans are supposed to be used in very limited cases, so there is little chance of any AV aiming to find them specifically (up until now that is).
Heuristics are supposed to handle such cases, but you can test your malware against those heuristics until you are good to go and if they don't know of you, they can't change heuristics to catch you.

RTFA.

Kaspersky stated that their AV had already detected this heuristically as a variation of the R2D2 Trojan and blocked it. They suggest installing a password in your AV to prevent anyone adding any malware to its exclusions list, as the installers had physical access to the computer to install it.

Such' 'spyware' is rife in the Corporate world, but it's called "Document retention" and "monitoring for legal cases". Corporate smart phones, computers, etc. are all equipped with methods to record everything we do. Just because some shyster could possibly want to use it as an axe to such money from our company.

You *CAN* get a job in industry writing this kind of code. Seriously. It's out there.

And the empire is obviously a derivative work from copyrighted Nazi documents and patented Nazi methodology and procedures. I would love to see Lucas just absolutely ass-raped in court. George is a douchenozzle.

That fact that more people in the past haven't told Lucas to go get f**ked and stand their ground is why things are as ridiculous as they are. When you can copyright object shapes and terms such as "Droid" and win in court, all hope is lost. It's gotten to the point where it's so insane, I just g

In an interview the Sekret German Surveillance rep said: "Ve dont haf planz to releze a Linukz verson of SpyMaster 2000".
He cited multiple problems, including lack of support for MS Trojan API's on non-Windows platforms. While there is [not] an emulator, called Bier, it it not powerful enough to support full Trojan functionality suit.

Many Germans complained that this is the last reason that keeps them from switching to Linux. One of the interviewers complained: "They are using our Steuergeldern, there should be Chancengleichheit for all Trojans, not just Microsoft!"

If you have wireless, think of a fed with a laptop in the street - that will get into most OS X, Linux people of interest enjoying modern ethernet free computing.
If your a Mac or Linux setup is wired, the feds might chat with your isp and go direct down your isp network next time you connect.
Windows is well understood from a security admin ~ protective tools view. Its wide open and easy to slip something in on most versions.
Some new, unknown, different, exotic outgoing Mac/Linux software firewall/log m

Legal representatives of the trojan-authoring company "DigiTask" actually stated to german press that "basically DigiTask were able to supply software for other operating systems as well - if the contract tells them to do so."So your attempt to be funny does point in a completely wrong direction: those guys who wrote this "legal interception" piece of spyware are clearly "dangerous" to non-Windows platforms as well.

On a sidenote, for at least 30 years or so german students in school classes after elementary

I am sorry you took offense, but the joke was not aimed at Germans at all. The target was Windows and Netflix, although I don't name them directly. In fact, the title was ripped off from an article about Netflix:)

I am not a security expert, but highly doubt this Trojan could be created for Linux. Which distribution would it target? How would it gain access to root to install the Trojan? I am sure there are loopholes, and suppose they exploited one; the very moment someone finds it, that loophole is getti

No offense taken - I do see the whole trojan surveillance issue as being a very important issue for multiple reasons.

For example, many people are having their laughs on the low level of technical expertise being used in this trojan. A few ones are also laughing about how these trojans have been installed (e.g. in one case, a customs officer at an airport wanted to do some extensive checks on one suspect's notebook; the suspect handed them the notebook, the officer left for a few minutes into another room an

Slashdot used to be my primary news aggregator. Well, it's stories like this that push me away. Not the story itself, mind you, I was quite interested in the comments to it. No, the fact that all there was was "funny" jokes about Germans and their bad English. If I want that, I can watch fawlty towers on youtube, it's way more funny (http://www.youtube.com/watch?v=IngEMj4krpA [youtube.com]).